Build Security Incident Response for GDPR data protection Video Training Course Download
Size: 2.96 GB
Duration : 8.22 Hours
01 Introduction
001 Welcome Intro
002 Set your expectations
003 A 1st touch of what you will really get in the course
003 Data-Privacy-GDPR-CCPA-Learning-Plan-by-Roland-Costea.xlsx
004 1-Udemy-June-Data-Privacy-GDPR-CCPA-Learning-Plan-by-Roland-Costea-v2020-copy.xlsx
004 My first promise to you - get certified in less than 30 days CIPT CIPM CIPPE
005 Powerpoints.zip
005 Presentations (ppt).html
02 Incident Response in CyberSecurity
006 What is Incident Response and why do I need it
007 Incident Response Team
008 Incident Response Process and Procedures
009 Types of Security Incidents
010 Incident Response Tools - general
011 What is a SIEM
012 Incident Response Training
013 What is automation in incident response
013 security-automation-best-practices.pdf
03 Building a Security Operations Center (SOC)
014 What is a NOC
015 What is a SOC
016 Integrated NOC and SOC
017 Mission Team and Required Training
018 Types of SOC
019 Building a SOC
020 Cheat Sheets to help you in configuring your systems
020 Windows-File-Auditing-Cheat-Sheet-ver-Nov-E7.pdf
020 Windows-Logging-Cheat-Sheet-ver-Oct-E6.pdf
020 Windows-PowerShell-Logging-Cheat-Sheet-ver-Sept-E7-v2.1.pdf
020 Windows-Registry-Auditing-Cheat-Sheet-ver-Nov-E7.pdf
020 Windows-Splunk-Logging-Cheat-Sheet-v2.2.pdf
04 GDPR and Incident Response
021 0-EU-General-Data-Protection-Regulation-E6.pdf
021 GDPR intro
022 GDPR effects on Incident Response
023 How to create an effective IR plan
024 4.4-GDPR-Incident-Response-Process-and-Policy.pdf
024 GDPR Incident Response Process
025 4.5-Defradar-Information-Security-Incident-Response-Procedure.pdf
025 Lets draft the IRM Procedure
025 VISIO-GDPR-Information-Security-Incident-Response-Flowchart-10-30-18.vsd
026 4.6-Defradar-GDPR-EXAMPLE-Personal-Data-Breach-Notification-Form.pdf
026 4.6-Defradar-GDPR-Personal-Data-Breach-Notification-Procedure.pdf
026 How to treat data breaches
05 GDPR Incident Response Methodologies (IRM)
027 IRM-1-WormInfection.pdf
027 IRM1 - Worm Infection
028 IRM-2-WindowsIntrusion.pdf
028 IRM2 - Windows Intrusion
029 IRM-3-UnixLinuxIntrusionDetection.pdf
029 IRM3 - UnixLinux Intrusion Detection
030 IRM-4-DDOS.pdf
030 IRM4 - DDoS
031 IRM-5-MaliciousNetworkBehaviour.pdf
031 IRM5 - Malicious Network Behaviour
032 IRM-6-Website-Defacement.pdf
032 IRM6 - Website Defacement
033 IRM-7-WindowsMalwareDetection.pdf
033 IRM7 - Windows malware detection
034 IRM-8-Blackmail.pdf
034 IRM8 - Blackmail
035 IRM-9-SmartphoneMalware.pdf
035 IRM9 - SmartphoneMalware
036 IRM-10-SocialEngineering.pdf
036 IRM10 - Social Engineering
037 IRM-11-InformationLeakage.pdf
037 IRM11 - Information Leakage
038 IRM-12-InsiderAbuse.pdf
038 IRM12 - Insider Abuse
039 IRM-13-Phishing.pdf
039 IRM13 - Phishing
040 IRM-14-Scam.pdf
040 IRM14 - Scam
041 IRM-15-Ransomware.pdf
041 IRM15 - Ransomware
06 Incident Response Tools for GDPR compliance - free vs enterprise
042 Lessons learned by working in a SOC
043 A list of open source tools to use
043 Incident-Response-Tools-collection.docx
044 Windows Defender ATP
07 Banking challenges related to cyber risk
045 Today Challenges
046 Target and Distribution
047 Attack Methods
048 Infection vectors
049 Targeted attacks against financial institutions
050 Mobile platform and email scams
051 Takedowns and Conclusions
08 Financial Malware history with examples
052 Past 3 decades of malware (part 1)
053 Past 3 decades of malware (part 2)
054 The architecture of financial malware
055 Zeus
056 Zeus GameOver
057 SpyEye
058 IceIX
059 Citadel
060 Carberp
061 Shylock
062 Bugat
063 Dyre
064 Dridex
065 Shifu
066 Tinba
09 Making a business case for Financial Malware
067 Why Fraud Risk Engines fail
068 How to bypass 2 factor authentication (2FA)
069 Fraud Prevention Technology
070 Compliance and Legal Issues
071 Customer impact
072 Selecting the right cybercrime solution
073 Malware detection
074 Malware detection - advanced
075 Malware detection - how technology can help
076 Criminal Detection Account Takeover
077 What about mobile banking
10 Some simple hacking attempts - demo
078 Lab setup
079 XSRF attack
080 Compromising Public server
081 Break-In Compromising the victim computer
082 Other Web Application Attack Example
083 Locky Ransomware
084 Gathering Info Exfiltrate
11 Conclusion
085 Final thoughts and other documents
085 NIST.SP.800-61r2.pdf
086 1-Udemy-June-Data-Privacy-GDPR-CCPA-Learning-Plan-by-Roland-Costea-v2020-copy.xlsx
086 BONUS - Remember my first promise to you - get certified in less than 30 days
Build Security Incident Response for GDPR data protection Video Training Course
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.